Update 'README.md'

master
RightToPrivacy 2022-05-20 14:33:58 -04:00
parent b3d63a3c13
commit d8c9a4cfb5
1 changed files with 63 additions and 20 deletions

View File

@ -1,4 +1,4 @@
### wipri (WiFi Privacy)
### wipri (WiFi Privacy) - Privacy Disinfo Tool
### WIFi Device/MAC/Device Metadata Disinfo: Address Changer/Hostname randomizer/Device/Signal/location Privacy (derived from my previous maccleaner concept)
@ -6,11 +6,20 @@
[Without disconnecting you from the internet]
##### * NEW *: Thanks to popular request, wipri-list allows you to create random yet valid OUI lists, select random mac from this list and set it, remove etc
##### (you can install single 'quasi-perm' mac by choosing wipri-list -s command as your answer on initial install.sh 'boot' question (it's easy and install.sh automatically creates your first valid mac address in wipri-list's list during first run!)
##### Have great ideas you want to see? file an issue or contact me!
#### UPDATING WIPRI: Download the latest here or at Gitea Onion (address below) and re-run the install.sh, to overwrite your old wipri with new features!
##### Gitea Onion (Latest Always Here First: Main Repository): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/WiPri
* Privacy For Our Ethical Human Rights *
Learn More On Usage With Screenshots/video: https://politictech.wordpress.com/2021/12/18/wifi-privacy-with-wipri-any-linux-device/
***NEW: WiFi Access point randomize option (can be installed for boot via install script, or used on demand as wipri command: wipri -d wlan0 -p -A (sets random/valid OUI mac address of Apple/Samsung + simultaneously changes network name/SSID restarting hostapd).
#### Latest WiPri Updates first appear on Wipri's Tor Hidden Gitea Service (create an acct to make or contrib your own Wiki's, books, anon access, etc!): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/WiPri/ (view in Tor Browser)
### USE:
@ -25,8 +34,7 @@ wipri -d [device] -r [randomizes mac continually changing times/addresses] -a [c
-p Android/iPhone mimic mode: sets single static identity: randomly generated valid mac address of either Apple or Android.
-P Android/iPhone mimic mode: continually changing randomized Samsung/Apple mac address changes- continually changing,
at randomized changing times, using continually changing, randomized yet valid OUI Apple/Samsung mac addresses (this setting allows you to appear to WiFi trackers/sniffers [like KISMET] at any given time, as either an Android or iPhone;
-P Android/iPhone mimic mode: continually changing randomized Samsung/Apple mac address changes- continually changing, at randomized changing times, using continually changing, randomized yet valid OUI Apple/Samsung mac addresses (this setting allows you to appear to WiFi trackers/sniffers [like KISMET] at any given time, as either an Android or iPhone;
-m [mac here] sets a mac address of your choice, holds it for remainder of running (checks to ensure firmware does not reset it)
@ -43,38 +51,54 @@ at randomized changing times, using continually changing, randomized yet valid O
-a anonymous mode: launch coordinated random changes: each change happens simultaneously: when the mac address changes so does the hostname and txpower/signal. This is intended to simulate new devices and changing locations. All 3 changes happen simultaneously, at changing, randomized times.
-A WiFi Access Point Randomize: generates a generic yet completely random SSID Network Name and restarts hostapd with this new SSID. Tip: Pair with wipri's static mac settings (i, p, m) to create a new network.
[for -A above, a netcat notification is optional; be sure to check variables and change $ncnotify variable value to 'on' or 'off': may add flag for this in an update]
[for -A above, a netcat notification is optional; be sure to check variables and change $ncnotify variable value to 'on' or 'off': may add flag for this in an update]
### Simple Setup/Installation for new wipri command on Linux:
First if deciding to install to start at boot (option), edit the wipri flags in wipri.service to your liking.
sudo bash install.sh
sudo bash install.sh
(install.sh will install files exactly where they need to be.
Next, install.sh asks if you would like wipri to run automatically at boot (early to prevent any leaks). And you can choose whatever wipri or wipri-list command you would like to run at boot.)
That's it. wipri is now installed as a command.
install.sh offers the additional option of starting a wipri or wipri-list flag / command at boot
(if you answer 'yes' to the question of installing as a systemd service).
That's it. wipri is now installed as a command. install.sh gives the additional option of starting itself at boot
if you answer 'yes' to the question of installing as a systemd service. By default the systemd service will start
a new mac identity on each boot. You can change this by editing the wipri.service file.
Do not forget to include -d [devicename] when issuing commands.
Tip: if you decide to try the newer -A wifi access point randomize, pair with your choice of static mac flags to create new WiFi network (prevents static databasing such as Wigle)
For the above random ssid option I added optional netcat notification and will expand on this later. Post a question if you have one.
DISABLING WIPRI AT BOOT (IF YOU INSTALLED AND WISH TO STOP IT/DISABLE IT)
### Disabling WiPri Boot (Once installed) Is Very Easy:
sudo systemctl stop wipri (this stops current wipri process in systemd)
sudo systemctl disable wipri (this DISABLES WIPRI from next boot - use 'enable' to re-enable)
### Additional Info:
wipri generated mac addresses use valid OUI's (unlike many mac randomizations). See below for why.
If using a Pinephone I suggest selecting -p for home, -P for out. This will mimic an iPhone/Android phone: one of the most common devices around. -p for static (w/mac checking to prevent leaks), -P for continually changing Apple/Android mac at continuously changing times/mac addresses.
If using a Linux phone / device, I suggest selecting -p for home, -P for out. To mimic an iPhone/Android phone: one of the most common devices around. -p for static (w/mac checking to prevent leaks), -P for continually changing Apple/Android mac at continuously changing times/mac addresses.
For even more broad randomization use -r for continuously changing randomization at continuously changing randomized times (all brands) or -i for static random mac identity
### Why does wipri use valid OUI's?
One documented method of tracking down a devices' 'real mac address' includes
cancelling/striking out all mac addresses with an invalid/nonexistent OUI preface.
cancelling/striking out all mac addresses with an invalid/nonexistent OUI preface (common problem with other built in mac randomization options).
From here one can narrow down from false OUI's. Wipri avoids this issue by using OUI lists (all brands).
wipri is argument/flag based, to more easily allow you to incorporate wipri commands into scripts.
Run wipri command anytime you need privacy or (optionally) or use the install.sh script to install
@ -82,18 +106,33 @@ wipri w/optional new identity changes for each boot. Wipri disables ipv6 by defa
(ipv6 addresses at times are based on mac address) If you do not wish to disable ipv6, change value of
$turnipv6 variable to 'on'.
Another concern I've had with some other mac address randomization options is the commonly used "keep the real OUI".
#### SUPPORT CURRENT/FUTURE WORKS:
I understand the WHY behind this method. But personally don't want to follow it for my own devices. Example: what if in the history of a device, your new install were to leak the permanent mac somewhere?
CashApp: $HumanRightsTech - https://cash.app/$HumanRightsTech
Crypto Support Options Listed: https://buymeacoffee.com/politictech
https://www.buymeacoffee.com/politictech/posts (public Tutorials/Blog posts / option to donate a coffee if you feel up to it)
❤️ MONERO (RTP): 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
If the permanent OUI is being used, and logged, how might this become a risk of linking the 'spoofed' to the permanent (same REAL hardware OUI - narrows it down quite a bit)
I layout concerns here: https://youtu.be/291uohokEOQ?t=166
[backup blog: https://politictech.wordpress.com]
### ❤️ TUTORIALS + SUPPORT + PUBLIC SERVICES:
#### VIDEO CHANNELS (including guide to wipri, linux, sdr, more):
☕ READ TUTORIALS / BUY ME A COFFEE: https://buymeacoffee.com/politictech (+ current btc addy, most posts completely public or will become public)
❤️ MONERO: 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
❤️ CashApp: https://cash.app/$HumanRightsTech
📝 TUTORIAL POSTS: https://buymeacoffee.com/politictech/posts
GITEA ONION (ANONYMOUS GIT SERVICE: ADD YOUR PROJECTS OR CONTRIBUTE!): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/explore/repos
📝 Blog Mirror: https://politictech.wordpress.com (see https://buymeacoffee.com/politictech/posts for organized category posts + searchable titles)
🔐 💾 ANON PASTEBIN (PRIVATEBIN 🧅 TOR SERVICE): http://ikgybpx6kltqcnox3tv3zhw7zw3ig7f3jfjo6ypojpmoys7q4hcf2gid.onion/paste/ ('burn after reading', self destruct options, AES 256bit encrypted "zero knowledge-snark" (not even host can read pastes), password protection. For Community Use (ethical usage only)
### VIDEO CHANNELS (including guide to wipri, linux, sdr, more):
PEERTUBE: https://tube.tchncs.de/video-channels/privacy__tech_tips/videos
@ -106,4 +145,8 @@ BRIGHTEON: https://www.brighteon.com/channels/righttoprivacy
BITCHUTE: https://www.bitchute.com/channel/yourprivacytv
BRANDNEWTUBE: https://brandnewtube.com/@RightToPrivacy (NEW)
BRANDNEWTUBE: https://brandnewtube.com/@RightToPrivacy (NEW)
CONTACT / INQUIRY
<righttoprivacy[at]tutanota.com>